GPAC 2.3.0-dev

CPE Details

GPAC 2.3.0-dev
2.3.0-dev
2023-12-08
23h30 +00:00
2023-12-08
23h30 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:gpac:gpac:2.3.0-dev:*:*:*:*:*:*:*

Informations

Vendor

gpac

Product

gpac

Version

2.3.0-dev

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2025-7797 2025-07-18 17h44 +00:00 A vulnerability was found in GPAC up to 2.4. It has been rated as problematic. Affected by this issue is the function gf_dash_download_init_segment of the file src/media_tools/dash_client.c. The manipulation of the argument base_init_url leads to null pointer dereference. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 153ea314b6b053db17164f8bc3c7e1e460938eaa. It is recommended to apply a patch to fix this issue.
6.9
Moyen
CVE-2023-4679 2024-11-15 10h53 +00:00 A use after free vulnerability exists in GPAC version 2.3-DEV-revrelease, specifically in the gf_filterpacket_del function in filter_core/filter.c at line 38. This vulnerability can lead to a double-free condition, which may cause the application to crash.
5.9
Moyen
CVE-2023-1655 2023-03-27 00h00 +00:00 Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.
7.8
Haute
CVE-2022-29340 2022-05-05 10h46 +00:00 GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vulnerability in gf_isom_parse_movie_boxes_internal due to improper return value handling of GF_SKIP_BOX, which causes a Denial of Service. This vulnerability was fixed in commit 37592ad.
7.5
Haute
CVE-2022-29339 2022-05-05 10h44 +00:00 In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in utils/bitstream.c has a failed assertion, which causes a Denial of Service. This vulnerability was fixed in commit 9ea93a2.
7.5
Haute